Home / FAKE NEWS / Wikileaks Dismantles False BuzzFeed Article in One Tweet

Wikileaks Dismantles False BuzzFeed Article in One Tweet

Last week, Wikileaks dumped what seems to be authentic CIA documents which revealed, among other things, that the spy agency has a way of hacking into smart TV’s in order to spy on targeted persons of interest. The data dump, known as the Vault 7 release, also showed the CIA has the ability to hack into Apple phones as well. While the conjugation of the verb is apparently incorrect, when Buzzfeed News recently posted a tweet with an attached story which stated Apple had patched its IOS vulnerabilities described in Vault 7, Wikileaks responded with a tweet of its own.

The agency, committed to forcing governments to operate with transparency, called Buzzfeed “fakenews” and stated Apple had not been able to patch those weaknesses in its operating system.

In Buzzfeed’s own article Apple states: “…our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS…” — not all the issues, as Buzzfeed implied.

At one point, the FBI admitted it had not developed the capability to get into the Apple IOS. Readers may recall James Comey had actually petitioned Congress to force Apple to cooperate with the FBI and help the investigative bureau unlock one of the San Bernardino terrorist’s iPhones. Then, abruptly, Comey withdrew his request to mandate Apple to cooperate. As a result, those who were following the story began to speculate the FBI had found another way to get inside the phone.

READ MORE:  Apple Helps Cops Hide Police Brutality

With the Wikileaks data dump last week, the world now knows that Apple’s proprietary operating system is vulnerable to attack, and there’s nothing anyone can do about it. For years, iPhone and Apple users have been under the impression their operating system was not vulnerable to attack from viruses, spyware, or malware. And for decades now, there’ve been very few issues to cause concern or alarm. But that all changed last week with the revelation the government can penetrate their defenses at will.

According to Wikileaks, there are 14 exploits the CIA can and does use to gain access to IOS data. The hacking tools have eclectic names as well. Three are named Sal, Rhino, and Ironic, and the archive demonstrates the CIA was in the business of paying certain entities for the rights to the program and its uses.

Even Wired reiterated what Buzzfeed stated, that the company (Apple) had fixed the problems which the world’s most powerful spy agency exploited.

In the iOS documents: the security issues detailed are all given codenames, such as the Elderpiggy, Juggernaut, and Winterspy. Listed in the details are the types of exploit (e.g. API); the types of access the code run (kernel and remote exploits are featured); what version of iOS the flaw works for; descriptions of the issues; and who it was found by (GCHQ, the NSA, and more are featured). Apple has since said the flaws highlighted in the documents had already been fixed in past patches.

The government’s spin machine was in full force over the weekend, with the former CIA deputy director, Mike Morrell, calling it an “inside job” and said Americans should, “be proud that their intelligence agency has developed these capabilities to collect intelligence on our adversaries who are trying to undermine our security and in some cases kill Americans. So I think that is how the average American should think about it.” He also said earlier that Americans shouldn’t be worried about the CIA’s hacking operations, saying they’re not permitted to target American nationals.

READ MORE:  Breaking: Podesta Told Mills 'Dump All Those Emails' on Day News of Clinton's Private Email Server Broke

Well, Mr. Morrell, if that’s your real name, and if you’re no longer with the agency, it makes no difference to any free thinker. We don’t want any intelligence agency operative, former or not, telling us how we should think, especially one which is a part of an intelligence community which has reportedly been known to spy on all Americans.


    Mike Morell..”” He also said earlier that Americans shouldn’t be worried about the CIA’s hacking operations, saying they’re not permitted to target American nationals. WHAT HORSE SH!T . Every cell phone in America is tapped. Some going right to a loudspeaker at police central or any officer who has a radio.. All officers have access to all conversations at any and all times. We could easily do a dumbest cops videos with the foul ups some of their idiots have staged.

    • MostOfYouRBrainwashed HAHA

      “All officers have access to all conversations at any and all times.”

      You really believe that?

      • TOPDOG1

        Believing is for idiots. I am not a believer in anything. This is a generality. But yes ! I know it to be a fact. It is not just any old ‘Laa Dee Daa’ time, idiot but they use it in targeting suspects. It is the number one law enforcement tool on the planet. And it is now used and misused by nearly every Authoritarian government and regime on the planet. Look up “Stingray” and no not the fish.

        • MostOfYouRBrainwashed HAHA

          Yeah, none of the info was new to me.
          Yet the claim that “ALL officers have access to ALL conversations AT ANY AND ALL TIMES” is still one helluva reach.

          And no, most high school students are definitely NOT able to monitor my communication equipment. Provided that no one has physical access to your devices and you use your brain while using them, it’s pretty hard for someone else to remotely install malware on it.
          Usually it happens if the user fucks up in some way shape or form, carelessly clicks or taps on something that he shouldn’t have been clicking/tapping on. Drive-by infections, downloading a malicious file, executing unknown files, using outdated OS, falling for fake/manipulated websites, browsing the www without proper protection, etc. In all these cases, the user could’ve prevented it.

          • TOPDOG1

            Probably not every past voice communication you have made but the information (numbers place, location, time;etc, is still recorded and still stored in the cloud or corporate database..What is obvious is that Horse sh!t splatters. Yes it is a long reach; however it is a valid extrapolation.(look up logic) Anyone with advanced computor skills can hack your line.You don’t have to call me a dyed in the wool reprobate non-believer lets just say I am not so easily convinced. Your assumptions have very little basis in reality.

          • MostOfYouRBrainwashed HAHA

            No, sorry, you’re exaggerating big-time and getting things confused, and you obviously don’t exactly know how hacking a system really works. It’s not some kind of magic. Now if you have zero days or a backdoor it’s a different story, but most people don’t have that.
            Btw, most “hackers” who make videos showcasing their “skills” demonstrating how easy it is to infiltrate a system are not really the cream of the crop, which their videos usually reflect. LOL

          • TOPDOG1

            First # I do not appreciate some law enforcement troll stalking my posts. So..get the fuck off.Take your outdated technology back to Bedrock with Fred and Barney and get under it.. You are several years behind. Also after your have spent several more years studying electronics,(as i have) in attempt to better educate yourself then you will be qualified to make you statements. You sound just like those know nothing know-it-alls we have in the Republican party. It is obvious you have no idea(or only vaguely) what you are talking about.

          • TOPDOG1

            I’m not saying you don’t have an education and I have been overly harsh with my replys, now edited. However my use of extrapolated generalities is still valid, Just because you are not aware of something does not mean that it doesn’t exist.

  • tz1

    How can Apple (and Google) know they patched the vulnerabilities BEFORE WikiLeaks released them.
    Fine. Let Wikileaks just publish the iOS exploits so they will either be patched or become zero-days

  • rtb61

    Buzzfeed is nothing but a advertising agency masquerading as a social network, they should change their name to B$ feed, the favourite of PR=B$ agencies from all over the globe.